ºÝºÝߣ


Hostile Subdomain Takeover by Ankit Prateek

7 years ago • 836 Views

DFIR using Docker Containers by Deep Shankar Yadav

7 years ago • 348 Views

RAT - Kill or Get Killed! by Karan Bansal

8 years ago • 438 Views

IoT Security Risks and Challenges

8 years ago • 3448 Views

Hacking & Securing of iOS Apps by Saurabh Mishra

8 years ago • 382 Views

Quantum Computing by Rajeev Chauhan

8 years ago • 1626 Views

Network discovery - Inside out by Aakash Goel

8 years ago • 336 Views

Wonder walk in Rootkit Land by Himanshu Khokhar

8 years ago • 570 Views

WAF Evasion for XSS by Divya Mudgal

8 years ago • 207 Views

Pwning Windows Mobile applications by Ankit Giri

8 years ago • 625 Views

Pwning Windows Mobile Applications by Ankit Giri

8 years ago • 459 Views

Windows privilege escalation by Dhruv Shah

8 years ago • 2333 Views

Mapping your digital footprint by A K Goel

8 years ago • 450 Views

Meet the DIVA - by: Sandeep & Ankit

8 years ago • 329 Views